The Undeniable Truth
3 Views
• 06/16/24
0
0
Embed
paccione .co.uk
2 Subscribers
We show how to design protocols that resist attackers with remote attestation, including both completely cryptographic methods such as on-line deniable key establishment (that work against some adversaries and as adopted by the upcoming OTRv4) and methods that use TEEs (which can stop it completely).
By Lachlan Gunn, Ricardo Vieitez Parra & N Asokan
Full Abstract & Presentation Materials: https://www.blackhat.com/eu-18..../briefings/schedule/
Show more
Facebook Comments
SORT BY-
Top Comments
-
Latest comments